Leyi Shi

According to our database1, Leyi Shi authored at least 17 papers between 2007 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
RMTS: A robust clock synchronization scheme for wireless sensor networks.
J. Network and Computer Applications, 2019

Mimicry honeypot: an evolutionary decoy system.
IJHPCN, 2019

A Game-Theoretic Analysis for Distributed Honeypots.
Future Internet, 2019

Dynamic Distributed Honeypot Based on Blockchain.
IEEE Access, 2019

Deformable Convolutional Matrix Factorization for Document Context-Aware Recommendation in Social Networks.
IEEE Access, 2019

2018
Efficiently and Completely Identifying Missing Key Tags for Anonymous RFID Systems.
IEEE Internet of Things Journal, 2018

Performance Analysis of Honeypot with Petri Nets.
Information, 2018

Segmented Bloom Filter Based Missing Tag Detection for Large-Scale RFID Systems With Unknown Tags.
IEEE Access, 2018

2017
Efficient 3-dimensional localization for RFID systems using jumping probe.
Pervasive and Mobile Computing, 2017

2016
Patching by automatically tending to hub nodes based on social trust.
Computer Standards & Interfaces, 2016

2014
A decentralized and personalized spam filter based on social computing.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2014

An ACO-Based Trust Inference Algorithm.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014

2013
Automatic Patching Based on Social Computing in P2P Network.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

A Dynamic Trust Conference Algorithm for Social Network.
Proceedings of the Eighth International Conference on P2P, 2013

2012
An Improved Anti-collision Algorithm for ISO15693 RFID Systems.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012

2008
Full Service Hopping for Proactive Cyber-Defense.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

2007
Port and Address Hopping for Active Cyber-Defense.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2007


  Loading...